-
281
-
282
-
283
Dynamic privacy management in pervasive sensor networks
Published 2011“…This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people’s daily social space. …”
Get full text
Get full text
Get full text
Article -
284
Deploying Sensor Networks With Guaranteed Fault Tolerance
Published 2012“…We consider the problem of deploying or repairing a sensor network to guarantee a specified level of multipath connectivity (k-connectivity) between all nodes. …”
Get full text
Get full text
Get full text
Article -
285
Decentralized detection in sensor network architectures with feedback
Published 2012Get full text
Get full text
Article -
286
Database abstractions for managing sensor network data
Published 2012“…Sensor networking hardware, networking, and operating system software has matured to the point that the major challenges facing the field now have to do with storing, cleaning, and querying the data such networks produce. …”
Get full text
Get full text
Article -
287
-
288
On the key revocation schemes in wireless sensor networks
Published 2013“…Among all security issues, key management is the most attractive mechanism to ensure security of applications and network services in wireless sensor networks. Key management includes two important aspects namely: Key distribution, which constitutes the task of distributing secret keys to nodes in the network and Key revocation, which refers to the task of securely withdrawing the key information relating to any compromised network node. …”
Get full text
Proceeding Paper -
289
Security attacks and challenges in wireless sensor networks
Published 2009“…With the advancements of networking technologies and miniaturization of electronic devices, wireless sensor networks (WSN) have become an emerging area of research in academic, industrial, and defense sectors. …”
Get full text
Book Chapter -
290
Security management in heterogeneous distributed sensor networks
Published 2011“…A Heterogeneous Distributed Sensor Network (HDSN) is a type of distributed sensor network where sensors with different functional types participate at the same time. …”
Get full text
Book Chapter -
291
-
292
Security in wireless sensor networks: issues and challenges
Published 2006“…Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. …”
Get full text
Book Chapter -
293
Securing sensor reports in wireless sensor networks
Published 2007“…The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. …”
Get full text
Book Chapter -
294
-
295
-
296
-
297
-
298
Implications of radio fingerprinting on the security of sensor networks
Published 2007“…We further analyze the implications of device fingerprinting on the security of sensor networking protocols, specifically, we propose two new mechanisms for the detection of wormholes in sensor networks.…”
Conference item -
299
The application of self-validation to wireless sensor networks
Published 2008“…Self-validation is a valuable tool for extending the operating range of sensing systems and making them more robust. Wireless sensor networks suffer many limitations meaning that their efficacy could be greatly improved by self-validation techniques. …”
Journal article -
300